Following are definitions from the 1997 OECD Cryptography Principles
III. DEFINITIONS
For the purposes of the Guidelines:
"Authentication" means a function for establishing the validity of a
claimed identity of a user, device or another entity in an information or
communications system.
"Availability" means the property that data, information, and
information and communications systems are accessible and usable on a timely
basis in the required manner.
"Confidentiality" means the property that data or information is not
made available or disclosed to unauthorised individuals, entities, or
processes.
"Cryptography" means the discipline which embodies principles, means,
and methods for the transformation of data in order to hide its information
content, establish its authenticity, prevent its undetected modification,
prevent its repudiation, and/or prevent its unauthorised use.
"Cryptographic key" means a parameter used with a cryptographic
algorithm to transform, validate, authenticate, encrypt or decrypt data.
"Cryptographic methods" means cryptographic techniques, services,
systems, products and key management systems.
"Data" means the representation of information in a manner suitable for
communication, interpretation, storage, or processing.
"Decryption" means the inverse function of encryption.
"Encryption" means the transformation of data by the use of
cryptography to produce unintelligible data (encrypted data) to ensure its
confidentiality.
"Integrity" means the property that data or information has not been
modified or altered in an unauthorised manner.
"Interoperability" of cryptographic methods means the technical ability
of multiple cryptographic methods to function together.
"Key management system" means a system for generation, storage,
distribution, revocation, deletion, archiving, certification or application
of cryptographic keys.
"Keyholder" means an individual or entity in possession or control of
cryptographic keys. A keyholder is not necessarily a user of the key.
"Law enforcement" or "enforcement of laws" refers to the enforcement of
all laws, without regard to subject matter.
"Lawful access" means access by third party individuals or entities,
including governments, to plaintext, or cryptographic keys, of encrypted
data, in accordance with law.
"Mobility" of cryptographic methods only means the technical ability to
function in multiple countries or information and communications
infrastructures.
"Non-repudiation" means a property achieved through cryptographic
methods, which prevents an individual or entity from denying having
performed a particular action related to data (such as mechanisms for
non-rejection of authority (origin); for proof of obligation, intent, or
commitment; or for proof of ownership).
"Personal data" means any information relating to an identified or
identifiable individual.
"Plaintext" means intelligible data.
"Portability" of cryptographic methods means the technical ability to
be adapted and function in multiple systems.
--end---